H3C S5500-HI Switch Series Fundamentals Configuration Manual

  • Hello! I am an AI chatbot trained to assist you with the H3C S5500-HI Switch Series Fundamentals Configuration Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
H3C S5500-HI Switch Series
Fundamentals Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 5101
Document version: 6W100-20111031
Copyright © 2011, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C,
, Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S5500-HI documentation set includes 11 configuration guides, which describe the software
features for the H3C S5500-HI Switch Series Release 5101, and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Fundamentals Configuration Guide describes how to configure the command line interface (CLI), log
in to the switch, perform file management, configuration file management, and device management for
your switch, upgrade the software, ISSU and perform automatic configuration.
This preface includes:
Audience
Conventions
About the S5500-HI documentation set
Obtaining documentation
Technical support
Documentation feedback
Audience
This documentation is intended for:
Network planners
Field technical support and servicing engineers
Network administrators working with the S5500-HI Switch Series
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
Convention Description
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Description
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
About the S5500-HI documentation set
The H3C S5500-HI documentation set includes:
Documents Purposes
Product description and specifications
Marketing brochure Describe product specifications and benefits.
Documents Purposes
Technology white papers
Provide an in-depth description of software features and
technologies.
Hardware specifications and installation
Compliance and safety manual
CE DOCs
Provide regulatory information and the safety instructions that must be
followed during installation.
Installation quick start
Guides you through initial installation and setup procedures to help
you quickly set up your device.
Installation guide Provides a complete guide to switch installation and specifications.
PSR150-A [ PSR150-D ] Power
Modules User Manual
Describe the specifications, installation, and replacement of hot
swappable 150W power modules.
RPS Ordering Information for H3C
Low-End Ethernet Switches
Helps you order RPSs for switches that can work with an RPS.
User manuals for RPSs Describe the specifications, installation, and replacement of RPSs.
User manuals for interface cards
Describe the specifications, installation, and replacement of
expansion interface cards.
H3C Low End Series Ethernet Switches
Pluggable Modules Manual
Describes the specifications of pluggable transceiver modules.
Pluggable SFP[SFP+][XFP] Transceiver
Modules Installation Guide
Describe the installation, and replacement of SFP/SFP+/XFP
transceiver modules.
Software configuration
Configuration guides Describe software features and configuration procedures.
Command references Provide a quick reference to all available commands.
Operations and maintenance
H3C Series Ethernet Switches Login
Password Recovery Manual
Helps you deal with switch login password loss.
Release notes
Provide information about the product release, including the version
history, hardware and software compatibility matrix, version
upgrade information, technical support information, and software
upgrading.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com
.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]
– Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions]
Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]
– Provides the documentation released with the
software version.
Technical support
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to inf[email protected].
We appreciate your comments.
i
Contents
CLI configuration·························································································································································· 1
What is CLI? ······································································································································································1
Entering the CLI ·································································································································································1
Command conventions ·····················································································································································1
Undo form of a command················································································································································2
CLI views ············································································································································································2
CLI view description·················································································································································2
Entering system view················································································································································3
Exiting the current view············································································································································3
Returning to user view··············································································································································4
Using the CLI online help ·················································································································································4
Entering commands···························································································································································5
Editing command lines·············································································································································5
Entering a value of the STRING type ·····················································································································5
Entering incomplete keywords ································································································································6
Configuring command aliases ································································································································6
Configuring CLI hotkeys···········································································································································7
Redisplaying entered but not submitted commands ·····························································································8
Understanding command-line errors ·······························································································································8
Using command history····················································································································································9
Accessing history commands ··································································································································9
Configuring the history buffer size ·························································································································9
Controlling the CLI display············································································································································ 10
Multi-screen display··············································································································································· 10
Filtering output information··································································································································· 11
Configuring user privilege and command levels ········································································································ 14
Introduction ···························································································································································· 14
Configuring a user privilege level ······················································································································· 14
Switching user privilege level······························································································································· 17
Modifying the level of a command ····················································································································· 20
Saving the current configuration ·································································································································· 20
Displaying and maintaining CLI ··································································································································· 21
Login methods ····························································································································································22
Login methods································································································································································· 22
User interface overview················································································································································· 23
Users and user interfaces······································································································································ 23
Numbering user interfaces ··································································································································· 23
CLI login······································································································································································25
Logging in through the console port ···························································································································· 25
Configuration requirements·································································································································· 25
Login procedure····················································································································································· 26
Console login authentication modes ··················································································································· 28
Configuring none authentication for console login ··························································································· 29
Configuring password authentication for console login ··················································································· 30
Configuring scheme authentication for console login ······················································································· 31
Configuring common settings for console login (optional) ··············································································· 34
Logging in through Telnet·············································································································································· 36
Telnet login authentication modes ······················································································································· 36
ii
Configuring none authentication for Telnet login ······························································································ 37
Configuring password authentication for Telnet login ······················································································ 38
Configuring scheme authentication for Telnet login ·························································································· 40
Configuring common settings for VTY user interfaces (optional)······································································ 43
Configuring the device to log in to a Telnet server as a Telnet client······························································ 44
Logging in through SSH ················································································································································ 45
Configuring the SSH server·································································································································· 46
Configuring the SSH client to log in to the SSH server ····················································································· 49
Logging in through modems ········································································································································· 50
Configuration requirements·································································································································· 50
Login procedure····················································································································································· 50
Modem login authentication modes ···················································································································· 54
Configuring none authentication for modem login···························································································· 55
Configuring password authentication for modem login···················································································· 56
Configuring scheme authentication for modem login ······················································································· 57
Configuring common settings for modem login (optional)················································································ 60
Displaying and maintaining CLI login ························································································································· 62
Web login ··································································································································································64
Web login overview ······················································································································································ 64
Configuring HTTP login ················································································································································· 64
Configuring HTTPS login ··············································································································································· 65
Displaying and maintaining web login ······················································································································· 67
Web login example······················································································································································· 68
HTTP login example ·············································································································································· 68
HTTPS login example ············································································································································ 69
NMS login ··································································································································································72
NMS login overview······················································································································································ 72
Configuring NMS login················································································································································· 72
NMS login example······················································································································································· 73
User login control·······················································································································································76
User login control overview ·········································································································································· 76
Configuring login control over Telnet users················································································································· 76
Configuration preparation···································································································································· 76
Configuring source IP-based login control over Telnet users ············································································ 76
Configuring source and destination IP-based login control over Telnet users ················································ 77
Configuring source MAC-based login control over Telnet users······································································ 77
Source MAC-based login control configuration example················································································· 78
Configuring source IP-based login control over NMS users······················································································ 79
Configuration preparation···································································································································· 79
Configuring source IP-based login control over NMS users············································································· 79
Source IP-based login control over NMS users configuration example ·························································· 80
Configuring source IP-based login control over web users ······················································································· 81
Configuration preparation···································································································································· 81
Configuring source IP-based login control over web users··············································································· 81
Logging off online web users ······························································································································· 81
Source IP-based login control over web users configuration example ···························································· 82
FTP configuration························································································································································83
FTP overview··································································································································································· 83
Introduction to FTP ················································································································································· 83
FTP operation························································································································································· 83
Configuring the FTP client ············································································································································· 84
Establishing an FTP connection···························································································································· 85
iii
Managing directories on the FTP server ············································································································· 86
Operating the files on the FTP server ·················································································································· 86
Changing the username after FTP login·············································································································· 87
Maintaining and debugging the FTP connection······························································································· 88
Terminating an FTP connection···························································································································· 88
FTP client configuration example························································································································· 88
Configuring the FTP server ············································································································································ 90
Configuring FTP server operating parameters···································································································· 90
Configuring authentication and authorization on the FTP server ····································································· 91
FTP server configuration example························································································································ 92
Displaying and maintaining FTP··································································································································· 93
TFTP configuration······················································································································································95
TFTP overview································································································································································· 95
Introduction to TFTP ··············································································································································· 95
TFTP operation ······················································································································································· 95
Configuring the TFTP client············································································································································ 96
Displaying and maintaining the TFTP client ················································································································ 97
TFTP client configuration example································································································································ 97
File system management············································································································································99
File system overview ······················································································································································ 99
Filename formats ··················································································································································· 99
Managing files ······························································································································································· 99
Displaying file information ·································································································································100
Displaying the contents of a file·························································································································100
Renaming a file····················································································································································100
Copying a file······················································································································································100
Moving a file························································································································································100
Deleting a file·······················································································································································100
Restoring a file from the recycle bin··················································································································101
Emptying the recycle bin ····································································································································101
Managing directories ··················································································································································101
Displaying directory information ·······················································································································101
Displaying the current working directory··········································································································101
Changing the current working directory···········································································································102
Creating a directory············································································································································102
Removing a directory··········································································································································102
Managing storage media ···········································································································································102
Managing the space of a storage medium ······································································································102
Displaying and maintaining the NAND flash memory ···················································································103
Performing batch operations·······································································································································103
Setting the file system operation modes ····················································································································104
File system management examples ····························································································································104
Configuration file management ····························································································································· 106
Configuration file overview·········································································································································106
Types of configuration ········································································································································106
Format and content of a configuration file ·······································································································107
Coexistence of multiple configuration files ·······································································································107
Startup with the configuration file······················································································································107
Saving the running configuration ·······························································································································107
Enabling configuration file auto-save ················································································································108
Selecting the modes for saving the configuration file······················································································108
Setting configuration rollback·····································································································································109
Configuration rollback ········································································································································109
iv
Configuration task list ·········································································································································110
Configuring parameters for saving the current running configuration ··························································110
Enabling automatic saving of the running configuration ················································································111
Manually saving the running configuration······································································································112
Setting configuration rollback ····························································································································112
Specifying a startup configuration file·······················································································································113
Backing up the startup configuration file···················································································································113
Deleting a startup configuration file···························································································································113
Restoring a startup configuration file ·························································································································114
Displaying and maintaining a configuration file ······································································································114
Software upgrade configuration···························································································································· 116
Device software overview ···········································································································································116
Software upgrade methods·········································································································································116
Software upgrade through a system reboot··············································································································117
Upgrading Boot ROM through a system reboot ······························································································117
Upgrading system software through a system reboot (method I)···································································118
Upgrading system software through a system reboot (method II) ··································································118
Software upgrade by installing hotfixes ····················································································································119
Basic concepts in hotfix ······································································································································119
Patch state ····························································································································································119
Hotfix configuration task list ·······························································································································122
Configuration prerequisites ································································································································122
Installing a patch in one step ·····························································································································122
Installing a patch step-by-step ····························································································································123
Uninstalling a patch step-by-step ·······················································································································125
Displaying and maintaining software upgrade ········································································································126
Software upgrade configuration examples ···············································································································126
Immediate upgrade configuration example ·····································································································126
Hotfix configuration example·····························································································································128
ISSU configuration ·················································································································································· 129
ISSU overview ······························································································································································129
ISSU process and states······································································································································129
System software version rollback·······················································································································131
ISSU configuration ·······················································································································································131
ISSU configuration task list ·································································································································131
Prerequisites for performing ISSU ······················································································································132
Enabling version compatibility check················································································································133
Configuring ISSU·················································································································································133
Configure the ISSU version rollback timer········································································································135
Displaying and maintaining ISSU······················································································································136
ISSU configuration example··································································································································· 137
Current network status and requirements analysis ···································································································137
Current network status ········································································································································137
Network requirements·········································································································································137
Configuration procedure·············································································································································138
Prerequisites ·························································································································································138
ISSU upgrade preparation ·································································································································140
Performing compatible ISSU upgrade···············································································································144
Performing incompatible ISSU upgrade············································································································145
Device management ··············································································································································· 147
Device management overview····································································································································147
Configuring the device name ·····································································································································147
v
Changing the system time ···········································································································································147
Configuration guidelines ····································································································································147
Configuration procedure ····································································································································150
Enabling displaying the copyright statement ············································································································150
Configuring banners····················································································································································151
Introduction to banners ·······································································································································151
Configuration procedure ····································································································································152
Configuring the exception handling method·············································································································152
Rebooting the device ···················································································································································153
Rebooting devices immediately at the CLI ········································································································153
Scheduling a device reboot ·······························································································································153
Scheduling jobs····························································································································································154
Job configuration approaches ···························································································································154
Configuration guidelines ····································································································································155
Scheduling a job in the non-modular approach ······························································································155
Scheduling a job in the modular approach ·····································································································155
Disabling Boot ROM access ·······································································································································156
Configuring the power-saving function······················································································································156
Enabling the power-saving function ··················································································································156
Configuring power-saving status ·······················································································································157
Configuring the port status detection timer················································································································157
Configuring temperature thresholds for a device ·····································································································158
Clearing unused 16-bit interface indexes··················································································································159
Verifying and diagnosing transceiver modules·········································································································159
Verifying transceiver modules ····························································································································159
Diagnosing transceiver modules························································································································160
Displaying and maintaining device management····································································································160
Automatic configuration ········································································································································· 162
Automatic configuration overview······························································································································162
Typical automatic configuration network···················································································································162
How automatic configuration works ··························································································································163
Automatic configuration work flow ···················································································································163
Using DHCP to obtain an IP address and other configuration information ··················································164
Obtaining the configuration file from the TFTP server ·····················································································165
Executing the configuration file··························································································································167
Index ········································································································································································ 168
1
CLI configuration
What is CLI?
The command-line interface (CLI) enables you to interact with your device by entering text commands. At
the CLI, you can instruct your device to perform a given task by entering a text command and then
pressing Enter. Compared with a graphical user interface (GUI) where you use a mouse to perform
configuration, the CLI allows you to enter more information in one command line.
Figure 1 CLI example
Entering the CLI
The device provides multiple methods for entering the CLI, such as through the console port, through
Telnet, and through SSH. For more information, see the chapter “Login methods.
Command conventions
Command conventions help you understand command meanings. Commands in product manuals
comply with the conventions listed in Table 1.
Table 1 Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
2
Convention Description
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
NOTE:
The keywords of command lines are case insensitive.
Figure 2 shows how to read the clock datetime time date command by using Table 1 as a reference.
Figure 2 Read command line parameters
Following this example, you can enter the following command line at the CLI of your device and press
Enter to set the device system time to 10 o’clock 30 minutes 20 seconds, February 23, 2010.
<Sysname> clock datetime 10:30:20 2/23/2010
More complicated commands can be understood using Table 1 as a reference.
Undo form of a command
The undo form of a command restores the default, disables a function, or removes a configuration.
Almost all configuration commands have an undo form. For example, the info-center enable command
enables the information center, and the undo info-center enable command disables the information
center.
CLI views
CLI view description
Commands are grouped into different classes by function. To use a command, you must enter the class
view of the command.
CLI views adopt a hierarchical structure. See Figure 3.
A
fter logging in to the switch, you are in user view. The user view prompt is <device name>. In user
view, you can perform display, debugging, and file management operations, set the system time,
restart your device, and perform FTP and Telnet operations.
You can enter system view from user view. In system view, you can configure parameters such as
daylight saving time, banners, and short-cut keys.
3
From system view, you can enter different function views. For example, enter interface view to
configure interface parameters, create a VLAN and enter its view, enter user interface view to
configure login user attributes, create a local user and enter local user view to configure the
password and level of the local user.
NOTE:
Enter ? in any view to display all the commands that can be executed in this view.
Figure 3 Command line views
……
Entering system view
When you log in to the device, you automatically enter user view, where <Device name> is displayed.
You can perform limited operations in user view, for example, display operations, file operations, and
Telnet operations. To perform further configuration on the device, enter system view.
Follow the step below to enter system view:
To do… Use the command… Remarks
Enter system view from user view system-view
Required
Available in user view
Exiting the current view
The CLI is divided into different command views. Each view has a set of specific commands and defines
the effective scope of the commands. The commands available to you at any given time depend on the
view you are in.
Follow the step below to exit the current view:
4
To do… Use the command… Remarks
Return to the parent view from the
current view
quit
Required
Available in any view.
NOTE:
The quit command in user view terminates the current connection between the terminal and the
device.
In public key code view, use the public-key-code end
command to return to the parent view (public ke
y
view). In public key view, use the peer-public-key end command to return to system view.
Returning to user view
This feature allows you to return to user view from any other view, without using the quit command
repeatedly. You can also press Ctrl+Z to return to user view from the current view.
Follow the step below to exit to user view:
To do… Use the command… Remarks
Return to user view return
Required
Available in any view except user
view
Using the CLI online help
Enter a question mark (?) to access online help. See the following examples.
1. Enter ? in any view to display all commands available in this view as well as brief descriptions of
the commands. For example:
<Sysname> ?
User view commands:
archive Specify archive settings
backup Backup next startup-configuration file to TFTP server
boot-loader Set boot loader
bootrom Update/read/backup/restore bootrom
cd Change current directory
…Part of the output is not shown…
2. When you enter part of a command and a ? separated by a space.
If ? is at the keyword position, the CLI displays all possible keywords with a brief description for each
keyword. For example:
<Sysname> terminal ?
debugging Send debug information to terminal
logging Send log information to terminal
monitor Send information output to current terminal
trapping Send trap information to terminal
If ? is at the argument position, the CLI displays a description about this argument. For example:
<Sysname> system-view
[Sysname] interface vlan-interface ?
5
<1-4094> VLAN interface
[Sysname] interface vlan-interface 1 ?
<cr>
[Sysname] interface vlan-interface 1
The string <cr> indicates that the command is a complete command, and you can be executed by
pressing Enter.
3. Enter an incomplete character string followed by?. The CLI displays all commands starting with the
entered character(s).
<Sysname> f?
fixdisk
format
free
ftp
<Sysname> display ftp?
ftp
ftp-server
ftp-user
Entering commands
Editing command lines
Table 2 Editing functions
Key Function
Common keys
If the edit buffer is not full, pressing a common key inserts the character at the
position of the cursor and moves the cursor to the right.
Backspace
Deletes the character to the left of the cursor and moves the cursor back one
character.
Left arrow key or Ctrl+B The cursor moves one character space to the left.
Right arrow key or Ctrl+F The cursor moves one character space to the right.
Tab
If you press Tab after entering part of a keyword, the system automatically
completes the keyword:
If there is a unique match, the system substitutes the complete keyword for
the incomplete one and displays it in the next line.
If there is more than one match, you can press Tab repeatedly to cycle
through all the keywords starting with the character string that you
entered.
If there is no match, the system does not modify the incomplete keyword
and displays it again in the next line.
Entering a value of the STRING type
A value of the STRING type can contain any printable character except the question mark (?), quotation
mark (“), backward slash (\), and the blank space. The ASCII code range of printable characters is from
32 to 126. For example:
6
<Sysname> system-view
[Sysname] snmp-agent group v3 ?
STRING<1-32> Group name
In this example, the SNMPv3 group name is an argument of the STRING type. It can contain 1 to 32
characters, each of which can be any printable character except the question mark (?), quotation mark
(“), backward slash (\), and the blank space. You can enter a value such as test-v3.
Entering incomplete keywords
You can enter a command comprising incomplete keywords that can uniquely identify the complete
command.
In user view, for example, commands starting with an s include startup saved-configuration and
system-view.
To enter system view, enter sy.
To set the configuration file to be used at the next startup, enter st s.
You can also press Tab to have an incomplete keyword automatically completed.
Configuring command aliases
The command alias function allows you to replace the first keyword of a command with your preferred
keyword. For example, if you configure show as the replacement for the display keyword, then to execute
the display xx command, you can enter the command alias show xx.
Note the following guidelines when configuring command aliases:
When you enter a command alias, the system displays and saves the command in its original
format instead of its alias. In other words, you can define and use a command alias but the
command is not restored in its alias format.
When you define a command alias, the cmdkey and alias arguments must be in their complete
form.
When you enter an incomplete keyword that partially matches both a defined alias and the
keyword of a command and the command alias function is enabled, the alias takes precedence. To
execute the command whose keyword partially matches your input, enter the complete keyword.
When you enter a character string that partially matches multiple aliases, the system gives you
prompts.
If you press Tab after you enter an alias keyword, the original format of the keyword is displayed.
You can replace only the first keyword of a non-undo command instead of the complete command.
You can replace only the second keyword of undo commands.
Follow these steps to configure command aliases:
To do… Use the command… Remarks
Enter system view system-view
Enable the command alias function command-alias enable
Required
Disabled by default, which means
you cannot configure command
aliases.
Configure a command alias
command-alias mapping cmdkey
alias
Required
Not configured by default.
7
Configuring CLI hotkeys
Follow these steps to configure CLI hotkeys:
To do… Use the command… Remarks
Enter system view system-view
Configure CLI hotkeys
hotkey { CTRL_G | CTRL_L |
CTRL_O | CTRL_T | CTRL_U }
command
Optional
The Ctrl+G, Ctrl+L and Ctrl+O
hotkeys are specified at the CLI by
default.
Display hotkeys
display hotkey [ | { begin |
exclude | include }
regular-expression ]
Available in any view. See Table 3
for hotkeys reserved by the syst
em.
NOTE:
By default, the Ctrl+G, Ctrl+L and Ctrl+O hotkeys are associated with pre-defined commands as defined
below, but the Ctrl+T and Ctrl+U hotkeys are not.
Ctrl+G corresponds to the display current-configuration command.
Ctrl+L corresponds to the display ip routing-table command.
Ctrl+O corresponds to the undo debugging all command.
Table 3 Hotkeys reserved by the system
Hotkey Function
Ctrl+A Moves the cursor to the beginning of the current line.
Ctrl+B Moves the cursor one character to the left.
Ctrl+C Stops performing a command.
Ctrl+D Deletes the character at the current cursor position.
Ctrl+E Moves the cursor to the end of the current line.
Ctrl+F Moves the cursor one character to the right.
Ctrl+H Deletes the character to the left of the cursor.
Ctrl+K Terminates an outgoing connection.
Ctrl+N Displays the next command in the history command buffer.
Ctrl+P Displays the previous command in the history command buffer.
Ctrl+R Redisplays the current line information.
Ctrl+V Pastes the content in the clipboard.
Ctrl+W Deletes all the characters in a continuous string to the left of the cursor.
Ctrl+X Deletes all characters to the left of the cursor.
Ctrl+Y Deletes all characters to the right of the cursor.
Ctrl+Z Exits to user view.
Ctrl+] Terminates an incoming connection or a redirect connection.
8
Hotkey Function
Esc+B Moves the cursor to the leading character of the continuous string to the left.
Esc+D
Deletes all the characters of the continuous string at the current cursor position and
to the right of the cursor.
Esc+F Moves the cursor to the front of the next continuous string to the right.
Esc+N Moves the cursor down by one line (available before you press Enter)
Esc+P Moves the cursor up by one line (available before you press Enter)
Esc+< Specifies the cursor as the beginning of the clipboard.
Esc+> Specifies the cursor as the ending of the clipboard.
NOTE:
The hotkeys in Table 3 are d
efined by the switch. If the same hotkeys are defined by the terminal software
that you use to interact with the switch, the hotkeys defined by the terminal software take effect.
Redisplaying entered but not submitted commands
If your command input is interrupted by output system information, you can use this feature to redisplay
the commands entered previously but not submitted.
Follow these steps to enable redisplaying of commands previously entered but not submitted:
To do… Use the command… Remarks
Enter system view system-view
Enable redisplaying of entered
but not submitted commands
info-center synchronous
Required
Disabled by default
NOTE:
With this feature enabled, the following rules apply:
If you have no input at the command line prompt and the system outputs system information such as
logs, the system will not display the command line prompt after the output.
If the system outputs system information when you are entering
interactive information (not YES/NO for
confirmation), the system does not redisplay the prompt information but a line break after the output and
then display what you have entered.
For more information about the info-center synchronous command, see
Network Management and
Monitoring Command Reference
.
Understanding command-line errors
If a command contains syntax errors, the CLI reports error information. Table 4 lists some common
command line errors.
Table 4 Common command line errors
Error information Cause
% Unrecognized command found at '^' position.
The command was not found.
9
Error information Cause
% Incomplete command found at '^' position. Incomplete command
% Ambiguous command found at '^' position. Ambiguous command
Too many parameters Too many parameters
% Wrong parameter found at '^' position. Wrong parameters
Using command history
The CLI automatically saves the commands recently used in the history command buffer. You can access
these commands and execute them again.
Accessing history commands
Follow a step below to access history commands:
To do… Use the key/command… Result
Display history commands
display history-command [ |
{ begin | exclude | include }
regular-expression ]
Displays valid history commands you
used
Display the previous history
command
Up arrow key or Ctrl+P
Displays the previous history command, if
any
Display the next history
command
Down arrow key or Ctrl+N Displays the next history command, if any
NOTE:
You can use arrow keys to access history commands in Windows 200X and XP Terminal or Telnet.
However, in Windows 9X HyperTerminal, you need to use Ctrl+P or Ctrl+N, because they are defined
differently and the up and down arrow keys are invalid.
The commands saved in the history command buffer are in the same format in which you entered
the commands. If you enter an incomplete command, the command saved in the history command
buffer is also incomplete.
If you execute the same command repeatedly, the switch saves the earliest record. However, if you
execute the same command in different formats, the system saves them as different commands. For
example, if you execute the display cu command repeatedly, the system saves only one command
in the history command buffer. If you execute the command in the format of display cu and display
current-configuration respectively, the system saves them as two separate commands.
By default, the CLI can save up to 10 commands for each user. To set the capacity of the history
command buffer for the current user interface, use the history-command max-size command. (For
more information about the history-command max-size command, see Fundamentals Command
Reference.
Configuring the history buffer size
Follow these steps to configure the history buffer size:
/